Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-dimensional code based method for realizing extended authentication control of smart card on mobile equipment

A mobile device and extended authentication technology, which is applied in the field of smart card holder identity verification and information security, can solve the problems that mobile devices and PC terminals cannot interact, semiconductors and USB slots wear out, and limit the scope of Internet applications, etc., to achieve Stable and reliable working performance, convenient use, and the effect of reducing communication overhead

Active Publication Date: 2013-10-23
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF5 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The unstable factors of the card reader affect the user experience, such as the compatibility of the card reader, the wear and tear of the parts connected to the semiconductor and the USB slot, etc.
At the same time, the configuration of card readers requires a certain cost, which affects the popularity of smart cards
[0005] The access method is not flexible enough, mobile devices and PC terminals cannot interact
With the popularization of the mobile Internet, people are increasingly dependent on mobile devices, and general mobile devices do not have the function of reading eID cards, which greatly limits its application range on the Internet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional code based method for realizing extended authentication control of smart card on mobile equipment
  • Two-dimensional code based method for realizing extended authentication control of smart card on mobile equipment
  • Two-dimensional code based method for realizing extended authentication control of smart card on mobile equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to understand the technical content of the present invention more clearly, the following examples are given in detail.

[0046] Firstly, the definitions of some symbols in the invention are given below:

[0047] ●API: Application Programming Interface (Application Programming Interface), the call interface left by the operating system to the application program, and the application program makes the operating system execute the command or action of the application program by calling it;

[0048] ●Login Type Qualifier: identifies the type of client accessing the server, and distinguishes eID mobile device clients and PC browsers;

[0049] ●SID: a globally unique number generated by the eID service system;

[0050] ●VDID: virtual device number, the number used to identify the virtual device;

[0051] ●URL: Uniform Resource Locator (Uniform Resource Locator), that is, the address of a web page, is the address of a standard resource on the Internet.

[0052] see...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a two-dimensional code based method for realizing extended authentication control of a smart card on mobile equipment. The method comprises the following steps: an eID application program sends a service request to an eID service system; the eID service system returns a two-dimensional code including registry key information to the eID application program and monitors the status of the registry key information; the two-dimensional code is scanned; information acquisition is conducted; whether an eID card is registered or not is checked; the registration authority information of the eID card is read or encrypted and then sent to the eID service system; the eID service system achieves eID registration authority treatment; the session key is updated according to the result; the eID application program receives application service provided by the eID service system. By adopting the two-dimensional code based method for realizing extended authentication control of the smart card on mobile equipment, the dependence of the smart card on a traditional card reader is reduced, the identity authentication is safe and reliable, the use is convenient, quick and safe, the working performance is stable and reliable and the application range is relatively wide.

Description

technical field [0001] The invention relates to the field of information security, in particular to the technical field of smart card holder identity legality verification, and specifically refers to a method for realizing smart card extended authentication control on a mobile device based on a two-dimensional code. Background technique [0002] Today, with the rapid development of the mobile Internet and the traditional Internet, whether it is e-commerce in the commercial field, online banking transactions, or personal data confidentiality, a secure identification and authentication method is required. The emergence of smart cards meets people's needs. Smart password card or smart card is a special security device that uses microelectronics technology for information storage and processing. It can not only safely store confidential information such as private keys and passwords, but also has built-in encryption algorithm programs to complete encryption and decryption opera...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/44G06K7/10H04L9/32
Inventor 金波严则明杨明慧邹翔胡永涛黄苏杨
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products